Sciweavers

252 search results - page 21 / 51
» Why Do Upgrades Fail and What Can We Do about It
Sort
View
PET
2010
Springer
13 years 11 months ago
How Unique Is Your Web Browser?
We investigate the degree to which modern web browsers are subject to “device fingerprinting” via the version and configuration information that they will transmit to website...
Peter Eckersley
EXPERT
2008
120views more  EXPERT 2008»
13 years 7 months ago
The CKC Challenge: Exploring Tools for Collaborative Knowledge Construction
The great success of Web 2.0 is mainly fuelled by an infrastructure that allows web users to create, share, tag, and connect content and knowledge easily. The tools for developing...
Natalya Fridman Noy, Abhita Chugh, Harith Alani
SIGKDD
2000
96views more  SIGKDD 2000»
13 years 7 months ago
Phenomenal Data Mining: From Data to Phenomena
Phenomenal data mining finds relations between the data and the phenomena that give rise to data rather than just relations among the data. For example, suppose supermarket cash r...
John McCarthy
AAAI
2007
13 years 10 months ago
On the Reasoning Patterns of Agents in Games
What reasoning patterns do agents use to choose their actions in games? This paper studies this question in the context of Multi-Agent Influence Diagrams (MAIDs). It defines sev...
Avi Pfeffer, Ya'akov Gal
AICOM
2002
103views more  AICOM 2002»
13 years 7 months ago
The emergent computational potential of evolving artificial living systems
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Jirí Wiedermann, Jan van Leeuwen